Analysis
-
max time kernel
111s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 13:47
Static task
static1
Behavioral task
behavioral1
Sample
e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d.exe
Resource
win10v2004-20230220-en
General
-
Target
e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d.exe
-
Size
685KB
-
MD5
f9c70badd453f09490c4d1457d376ae5
-
SHA1
c9bc121f0e5d05e5d740ce75078f2257bc8de59e
-
SHA256
e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d
-
SHA512
65bd1453591a78477170b731f02f607d67912a2946e8f645183dda5bf7adafaa6c6c6bc2f1c232b4577f98f42a21ac8bb36bf87b73a24c4063f2a189ad717d69
-
SSDEEP
12288:YMr4y906rHsqtQcAfbTgLDby1boF9pGWE428fru1Volba7BINTE+nHZHwOA:wydg3fueW/rEoxmaNTE+n5H7A
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5211.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5211.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1184-191-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-192-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-196-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-200-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-202-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-204-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-206-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-208-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-210-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-212-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-214-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-216-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-218-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-220-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-222-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-224-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-226-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline behavioral1/memory/1184-228-0x0000000002990000-0x00000000029CE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3676 un155514.exe 4560 pro5211.exe 1184 qu2779.exe 2412 si822162.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5211.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un155514.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un155514.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3644 4560 WerFault.exe 86 1620 1184 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4560 pro5211.exe 4560 pro5211.exe 1184 qu2779.exe 1184 qu2779.exe 2412 si822162.exe 2412 si822162.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4560 pro5211.exe Token: SeDebugPrivilege 1184 qu2779.exe Token: SeDebugPrivilege 2412 si822162.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2320 wrote to memory of 3676 2320 e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d.exe 85 PID 2320 wrote to memory of 3676 2320 e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d.exe 85 PID 2320 wrote to memory of 3676 2320 e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d.exe 85 PID 3676 wrote to memory of 4560 3676 un155514.exe 86 PID 3676 wrote to memory of 4560 3676 un155514.exe 86 PID 3676 wrote to memory of 4560 3676 un155514.exe 86 PID 3676 wrote to memory of 1184 3676 un155514.exe 94 PID 3676 wrote to memory of 1184 3676 un155514.exe 94 PID 3676 wrote to memory of 1184 3676 un155514.exe 94 PID 2320 wrote to memory of 2412 2320 e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d.exe 97 PID 2320 wrote to memory of 2412 2320 e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d.exe 97 PID 2320 wrote to memory of 2412 2320 e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d.exe"C:\Users\Admin\AppData\Local\Temp\e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un155514.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un155514.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5211.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5211.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4560 -s 10844⤵
- Program crash
PID:3644
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2779.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2779.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1184 -s 19484⤵
- Program crash
PID:1620
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si822162.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si822162.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4560 -ip 45601⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1184 -ip 11841⤵PID:1144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5121fdd255ef4999ca52e52b429028615
SHA16a16fc0097acb0ccd96959c1e23e4d0579f99246
SHA256ef5474768250239b72aa570dca21ab072a3423f22f6f660232f8efa174f37fc2
SHA512413b124a343ad706c5e7d2e94dad7cec1b964eca30b0f7e2b3b87bb47634152a11c33dddf2f0c9a165ed0abc6477511dcad0ae24890bffd77593d096861b869f
-
Filesize
175KB
MD5121fdd255ef4999ca52e52b429028615
SHA16a16fc0097acb0ccd96959c1e23e4d0579f99246
SHA256ef5474768250239b72aa570dca21ab072a3423f22f6f660232f8efa174f37fc2
SHA512413b124a343ad706c5e7d2e94dad7cec1b964eca30b0f7e2b3b87bb47634152a11c33dddf2f0c9a165ed0abc6477511dcad0ae24890bffd77593d096861b869f
-
Filesize
543KB
MD529eb140471cce3f3d1f6a7ab3eb6f444
SHA1692371a9c78d105e2238b6cfc2d4f537a9c11e26
SHA2560d28dcf29396df35caf90832c2082cc89a9843ff2725aca6164ce1a1494643fb
SHA512b47426a1fd5a7a6be6bb8d72f2141802976e20c016df34d4a7bd155dcbfb62c49da4526fbb3ffe001716230eee603e158113b3e4b358cfa7b03751bf8a6baab6
-
Filesize
543KB
MD529eb140471cce3f3d1f6a7ab3eb6f444
SHA1692371a9c78d105e2238b6cfc2d4f537a9c11e26
SHA2560d28dcf29396df35caf90832c2082cc89a9843ff2725aca6164ce1a1494643fb
SHA512b47426a1fd5a7a6be6bb8d72f2141802976e20c016df34d4a7bd155dcbfb62c49da4526fbb3ffe001716230eee603e158113b3e4b358cfa7b03751bf8a6baab6
-
Filesize
292KB
MD52b90af72c076752ae1ed8a7c33604595
SHA1f807e4b978b96c872b59c54f5b8abc47b9d65791
SHA256c56acbb09fce8d9273ae55cfcea0a9d3d86472cd4a969d9e3eed355d338ce15a
SHA512dcc38631958605747e256b5b9995e32874d03556694214e032964e37a6a218d1f3e2dbc98085bf524acf6d1338a6dd44d9ca5fdda36e4c965151c1a06d30f3fd
-
Filesize
292KB
MD52b90af72c076752ae1ed8a7c33604595
SHA1f807e4b978b96c872b59c54f5b8abc47b9d65791
SHA256c56acbb09fce8d9273ae55cfcea0a9d3d86472cd4a969d9e3eed355d338ce15a
SHA512dcc38631958605747e256b5b9995e32874d03556694214e032964e37a6a218d1f3e2dbc98085bf524acf6d1338a6dd44d9ca5fdda36e4c965151c1a06d30f3fd
-
Filesize
350KB
MD50a11a91d92d1c3b96fb9d795392e65df
SHA1eedfc17c57248af9c059b88bf63ccda563fb368b
SHA2569fac97e693170cd21ff6034dba5fb2ec16235c960452346b61275aa3d240eaa8
SHA5124fd4b10d0e8bae18fa5dde0850ac067584b271eba66b52190efb1725aa840356895deae0f179175248c7a12b2326259869cc844a408c622c6572370ad034db7f
-
Filesize
350KB
MD50a11a91d92d1c3b96fb9d795392e65df
SHA1eedfc17c57248af9c059b88bf63ccda563fb368b
SHA2569fac97e693170cd21ff6034dba5fb2ec16235c960452346b61275aa3d240eaa8
SHA5124fd4b10d0e8bae18fa5dde0850ac067584b271eba66b52190efb1725aa840356895deae0f179175248c7a12b2326259869cc844a408c622c6572370ad034db7f